Anzen secured cloud storage
Data securitization enabling cost-effective use of any cloud-based storage of your choice. The Anzen securitization process provides unbreakable protection against breaches, theft and manipulation. Anzen also allows organisations to retain data sovereignty regardless of which territory the data is stored in.
Features
- Hyper secure data storage
- Works with other security measures, e.g. encryption
- Seamless integration with existing applications
- Open API
- Available as Salesforce App
Benefits
- Lower cost of secure cloud storage
- End-to-end security of data
- Simple implementation
- Data can be stored in any location
- Adhere to GDPR data sovereignty
Pricing
£6,000 to £75,000 a licence a quarter
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 12
Service ID
5 9 6 4 8 4 6 7 4 2 0 7 2 1 4
Contact
Caleidoscope Associates Ltd
Cato Rockne-Meyer
Telephone: 07811332511
Email: cato@caleidoscope.co.uk
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Anzen security solution enables lower cost cloud storage of Salesforce data via a Salesforce App (extension).
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- None
- System requirements
-
- Salesforce
- Support for open API
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Within 4 hours during office hours
Within 24 hours outside office hours
Other support levels are available on request
Office hours: Monday-Friday 0800-1800 - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Web chat support enables users to raise queries and issues in text form via the online chat function on our website. Web chat enquiries are forwarded to the on-duty support staff who respond directly from their smartphone or computer.
- Web chat accessibility testing
- Not applicable as we do not use assistive technology at this point in time.
- Onsite support
- Yes, at extra cost
- Support levels
-
We offer bespoke service level agreements and ad-hoc support.
The cost of bespoke service level agreements depends on the level of support required. The cost is based on the resources needed to provide the support.
Ad-hoc support is charged at standard rates, except for support at weekends and out of office hours, i.e. Monday-Friday 1800-0800. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide installation of the Salesforce App and provide training of the system administrator. We also provide documentation for support and instructions for the end-users.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- Other
- Other documentation formats
- MS PowerPoint
- End-of-contract data extraction
- If data securitization is no longer required, then the customer needs to retrieve all securitized data by downloading it.
- End-of-contract process
- If the customer decides that the securitization is no longer required, or wish to move to a different solution, then the customer will need to download and move the data out of the securitized storage before the end of the license.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 10
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari 9+
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- If the customer has deployed a Salesforce Mobile App, then the service can be included in this app.
- Service interface
- Yes
- Description of service interface
- The service uses Salesforce Lightning user interface components.
- Accessibility standards
- None or don’t know
- Description of accessibility
- The user can select records and files to be securitized and stored in the cloud. The customer system owner decides which storage locations to use (can be a mixture of on-premise and multiple cloud storage providers).
- Accessibility testing
- None as the service uses the Salesforce Lightning user interface.
- API
- Yes
- What users can and can't do using the API
-
The API allows the user to perform the Anzen securitization process (and its reverse) on files.
This is achieved using simple data structures, the main one being the dataset. A dataset represents the storage of a single piece of data (in this case a file). A file can be uploaded and assigned to the dataset for later processing.
Once a dataset has been created and a file has been uploaded, a securitization job can be created. This will take the uploaded file and securitize it to the specified locations using the Anzen process.
When the original file is required at a later point in time, it is a simple process of creating a restore job. This will perform the inverse securitization process and make the restored file available for download to the user. - API documentation
- Yes
- API documentation formats
- Open API (also known as Swagger)
- API sandbox or test environment
- Yes
- Customisation available
- No
Scaling
- Independence of resources
- We use cloud-compute (AWS, Azure, Oracle, etc.) to provide elastic on-demand infrastructure scaling.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Usage logs are available to the system administrator. These can be exposed to the end users, if required.
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Anzen Technology Systems Ltd
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- No
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Data can be retrieved using the reverse securitization process, i.e. downloading files from Salesforce or through the API.
- Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
- Original format (files are retrieved to original format)
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
- Service works with any file format
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- Other
- Other protection between networks
- Customer can choose the in-transit data protection required between their network and their chosen cloud provider.
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Other
- Other protection within supplier network
-
If the Anzen process is deployed to the same cloud infrastructure as the customer's preferred cloud storage provider, then there is no inter-connected network.
If the Anzen process is deployed to a different cloud infrastructure to the cloud storage provider(s), then the network protection depends on the chosen cloud infrastructure providers.
Availability and resilience
- Guaranteed availability
-
The service can be implemented on all major platform hosts to be agreed with the customer. If a host platform is not specified by the customer, then we use Amazon Elastic Compute Cloud (Amazon EC2).
Refund credits:
Less than 99.99% but equal to or greater than 99.0% = 10%
Less than 99.0% but equal to or greater than 95.0% = 30%
Less than 95.0% = 100% - Approach to resilience
- Service resilience is set up to meet the customer's requirement for resilience.
- Outage reporting
- In the case of service outages, customers are notified by email.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Other
- Other user authentication
- Authentication method is defined by the customer and their chosen cloud providers.
- Access restrictions in management interfaces and support channels
-
When installed in Salesforce, the customer administrator determines and controls the access restrictions within Salesforce.
When deployed as an API, the cloud host authentication can be used or additional authentication implemented. - Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Other
- Description of management access authentication
- Authentication for management access is defined by the customer and their chosen cloud providers.
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Our security approach mirrors that of the Anzen Technology Systems' security governance.
- Information security policies and processes
- Our information security policies and processes mirror those of Anzen Technology Systems.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Standards and procedures are defined by the customer and their chosen cloud providers.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Standards and procedures are defined by the customer and their chosen cloud providers.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Standards and procedures are defined by the customer and their chosen cloud providers.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Standards and procedures are defined by the customer and their chosen cloud providers.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
-
- Public Services Network (PSN)
- Police National Network (PNN)
- NHS Network (N3)
- Joint Academic Network (JANET)
- Scottish Wide Area Network (SWAN)
- Health and Social Care Network (HSCN)
- Other
- Other public sector networks
- API can integrated with any public sector network
Pricing
- Price
- £6,000 to £75,000 a licence a quarter
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- 30-day trial of API or Salesforce App